Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

10/28/2019
03:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Mini Documentary Examines How University of New Haven is Addressing Cybersecurity Talent Gap, Preparing Workforce of the Future

Produced by Ibrahim "Abe" Baggili - an internationally recognized digital forensics expert - for Cybersecurity Awareness Month, the short film gives an inside look at a pioneering camp developed by the University to prepare and help diversify the cybersecurity workforce of the future.

Ibrahim "Abe" Baggili, Ph.D., an internationally recognized expert in cybersecurity and digital forensics, understands the importance of getting younger generations interested in cybersecurity.

That's why, in addition to helping to build the University of New Haven's programs in cybersecurity and computer science that have garnered national attention, he's focusing on getting even younger students interested in the field.

That's the mission of the University's GenCyber Agent Academy, the only free summer camp of its kind in Connecticut that is supported by the National Science Foundation and the National Security Agency. An emphasis of the camp is introducing young women and individuals from traditionally underrepresented groups in cybersecurity to opportunities in the field.

As part of Cybersecurity Awareness Month, Baggili produced a mini documentary that gives an inside look at the camp and how the University is preparing the leaders who will be at the forefront of cybersecurity, a challenge identified as "one of the defining issues of our time" by the National Science Foundation.

"At the University of New Haven we embrace teaching cybersecurity concepts starting at a young age," said Baggili, the University's Elder Family Endowed Chair of Cybersecurity and Computer Science and founder of the University's Cyber Forensics Research and Education Group.

"We are passionate about involving underrepresented minority students in this effort and teaching skills to the future generation of the cybersecurity workforce that will protect our nation," he continued.

"We are passionate about involving underrepresented minority students in this effort and teaching skills to the future generation of the cybersecurity workforce that will protect our nation."Ibrahim "Abe" Baggili, Ph.D.

Why is this so important? By 2021, Cybersecurity Ventures, the world's leading researcher for the global cyber economy, predicts there will be 3.5 million unfilled positions in cybersecurity worldwide, creating potential vulnerabilities that could impact everything from elections and protecting businesses to safeguarding individuals' personal privacy, said Baggili.

"I'm driven by a passion to make the world safer – for my wife, my two daughters, and for people all over the world," he said. "Our efforts will play a critical role in helping to address the talent gap in the cybersecurity field."

"We need all the best and brightest minds to take on the greatest challenges facing the next generation," added Liberty Page, coordinator of the University's undergraduate program in cybersecurity and networks, and the lead instructor for the University's GenCyber Academy, who has extensive experience as a programmer, analyst, and software manager for Fortune 500 companies.

A central component of the current phase of the University's Charger Challenge Centennial campaign is the "Securing Our Future" initiative, which endeavors to establish a named school of Cybersecurity, Computing, and Artificial Intelligence, develop a state-of-the-art facility featuring expanded lab space, create new student scholarships, and fund additional endowed professorships.

"The University of New Haven is on a path to become the best cybersecurity and cyber forensics university in the country – and that's what we are going to do," says Baggili. "It's a mindset of success."

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15505
PUBLISHED: 2020-07-07
MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1, and Sentry before 9.7.3 and 9.8.x before 9.8.1, allow remote attackers to execute arbitrary code via unspecified vectors.
CVE-2020-15506
PUBLISHED: 2020-07-07
MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1 allow remote attackers to bypass authentication mechanisms via unspecified vectors.
CVE-2020-15507
PUBLISHED: 2020-07-07
MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1 allow remote attackers to read files on the system via unspecified vectors.
CVE-2020-15096
PUBLISHED: 2020-07-07
In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affecte...
CVE-2020-4075
PUBLISHED: 2020-07-07
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not ...